Over a million developers have joined DZone.

Customer Success: Using Log Data to Respond to Security Incidents

DZone's Guide to

Customer Success: Using Log Data to Respond to Security Incidents

· Performance Zone
Free Resource

Evolve your approach to Application Performance Monitoring by adopting five best practices that are outlined and explored in this e-book, brought to you in partnership with BMC.

One of the more unique customer use cases we’ve seen recently is allowing the security incident response team to use log data to track malicious attempts against their network.  It is well established that Logentries can maintain log data across all of your systems – but adding just a few more pieces of information can result in deep insights into your security measures and their effectiveness.Logs as Data for Security

So how do you do this today? Most current generation firewalls and routers support syslog capabilities and can be sent to Logentries for analysis.  By adding in logs from Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) and vulnerability scanners, you can achieve a complete “beginning to end” view of an access attempt.

With the new grouping feature, you can easily group your edge router, firewall, internal routers, IDS/IPS, vulnerability scanner, and access, system, and error logs from the physical machines into one centralized location.  With just a few clicks you can easily be set-up to monitor these security logs in real-time and to trace a connection through your entire network to determine which security measures succeeded or failed. This gives you immediate visibility into if — and how – the network was exploited.

Have questions? Feel free to email me directly at tom.smit@Logentries.com, or contact our Support team at support@logentries.com!Using Logentries to identify security issues

Learn tips and best practices for optimizing your capacity management strategy with the Market Guide for Capacity Management, brought to you in partnership with BMC.


Published at DZone with permission of Trevor Parsons, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

The best of DZone straight to your inbox.

Please provide a valid email address.

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}